Document 7167354

Download Report

Transcript Document 7167354

Verimatrix / Siemens Watermarking Technology Application

A presentation to the CPTWG

April 13, 2004

1

Verimatrix in partnership with Siemens ICN is able to provide a video watermarking solution for the ‘analog hole’ based upon technology developed initially by the Fraunhofer Institute and licensed by Verimatrix.

April 13, 2004

2

Overview

Applied to the Analog Hole, the solution is:

 a novel video watermarking technology application  highly viable as a video watermark:  Invisible – conveys CCI  Extremely reliable and robust  Multi-layered for excellent security  Highly resistant against sophisticated attack.

 Economic for inclusion in low-cost codec chips for CE and IT devices

Intended for use in broadcast, cable, satellite, and fixed media applications

April 13, 2004

3

Platforms with Analog outputs

Cable Satellite DVD Player VCR

How it works

Device

Digital Recorder WM Detector Analog Video with Watermark

>

Analog to Digital

> Copy rules obeyed

WM Detector Internet DVD R/RW Other A/D converters: DTV, PC, DVR, …

April 13, 2004

4

CCI Primary States

State

“Copy Never” “Copy Once” “Do Not Play” “Copy Freely”

Action

Copy not allowed One Copy allowed Copy not permitted, display only through theatrical projector Encrypted copy allowed

Redistribution

Not allowed Not allowed Not allowed Not allowed

April 13, 2004

5

Intellectual Property

 Patents: – US: # 6,359,985 (with the priority date on Jun 16, 1995). This patent covers a set of digital watermarking methods, including a method for watermarking color or grayscale images or videos by slightly modifying coefficients in frequency representation (particularly in DCT domain) of digital data.

– Europe: EP 879535B1, DE 195 219 69 C1 – Pending in Japan, Canada, … (WO 97/00578 A1) – Backed by Legal Opinions

April 13, 2004

6

Technical Information

    Frequency-based (DCT-based) perceptual modeling  for best invisibility Tightly-bound with the content of digital data  cannot be lifted Securely embedded  multiple layer security Watermark survives all kinds of video processing typically used in a professional environment:    copying, editing, further compression stages, logo insertion, or conversion to the analog domain, discoverable in Digital to Digital transcoding.

April 13, 2004

7

MPEG Encoder Overview

Input Video Pre processing Motion Estimation DCT Quantization Variable Length Coding MPEG Video Output

Example of standard MPEG encoder

April 13, 2004

8

MPEG Encoder with Watermark Insertion

Input Video Pre processing Motion Estimation DCT Quantization W E A M T B E E R D M D A E R R K Variable Length Coding MPEG Video Output

Example of standard MPEG encoder with Watermark Inserter

April 13, 2004

9

Watermark Embedding

Original Data Secret Key Positions Position Sequence Generator Block based DCT Watermark Embedding System Block based IDCT Watermarked Data Watermark Information (Payload)

April 13, 2004

10

Watermark insertion using DCT coefficients

212 DCT Coefficients (post Quantization) 65 0 0 312 785 0 0 0 0 0 244 72

16 17

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 W E A M T B E E R D M D A E R R 0 K 0 0 0 0 0 0 212 DCT Coefficients (post Watermarking) 65 0 0 312 785 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 244 0 0 0 0 0 0 72 0 0 0 0 0 0 18 0 0 0 0 0 0 17 0 0 0 0 0 0 0 0 0 0 0 0 0 From the input DCT coefficients the Ratio of the highlighted DCT values will be used to add a watermark bit

April 13, 2004

For the bit being added - that the ratio of the two DCT values must be set such that the first bit is larger than the second bit. Meaning the bit value of 16 must be changed to be larger than 17. Depending on the perceptual model the value 17 could have been changed to 15 to establish the correct ratio.

11

0 0 0 0 0 0 0

Watermark detection using DCT coefficients

DCT Coefficients (post inverse quantization) 212 65 0 0 312 785 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 244 72 18 17 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 D E T E C T O R Extracted watermark payload bits is based on the ratio of the two highlighted DCT coefficients

April 13, 2004

12

MPEG Decoder Overview

MPEG Input Variable Length Decoding Inverse Quantization IDCT Post Processing Output Video

Example of standard MPEG decoder

April 13, 2004

13

MPEG Decoder with Watermark Detector

MPEG Input Variable Length Decoding Inverse Quantization W D A E T T E E R C M T A O R R K IDCT Post Processing Output Video

Example of standard MPEG decoder with Watermark Detector

April 13, 2004

14

Feature Summary

     Watermarking can occur in DCT-based compressed video (MPEG1, MPEG2, MPEG4, H.264, WM9, other) Detection in both compressed or non-compressed video Watermarking each frame (may partially watermark P- or B frames if direct watermarking in compressed data required) Support for all MPEG1 and MPEG2 profiles: MP@ML, 4:2:2P@ML, and MP@HL, other The MPEG-2 video materials can be: – long GOP or I-frame only – variable (VBR) or constant (CBR) bit rates – Program Streams or Transport Streams – 16:9 and 4:3 aspect ratios supported

April 13, 2004

15

Feature Summary (cont.)

   Very low false positive rate is achieved by aggregating watermark signals from video frames (in time domain) Robust against, for example:  D/A, A/D, and VHS conversion  Down to 200K bps Divx compression  Format conversion (PAL<->NTSC)  Scaling, shifting and cropping  Low-pass filtering  Noise addition Invisibility:  Passed several tests by professional independent organizations

April 13, 2004

16

Feature Summary (cont.)

    Any bit rates from 500 Kbps (MPEG-4) up to 50 Mbps (MPEG-2, 4:2:2 profile @ main level) High Level coding capabilities (HD) PAL and NTSC supported Codec independent

April 13, 2004

17

Feature Summary (cont.)

“Tamper Proofing” Through Onion Skin “Peel-Away”  Watermark detectors look for one of several possible marks.

 If one mark is compromised, detector can move to one of the alternate marks to restore usefulness.

 Different marks could assert different codes.

April 13, 2004

18

      

Competitive Advantages

Low Insertion Overhead

performed on compressed MPEG (in DCT domain); up to 10x real time can be achieved : watermark embedding can be Low-cost: both watermark embedding and detection can be implemented in chips very economically; DCT/IDCT processing circuitry is very well known in video industry.

* * * Efficient * * *: To change CCI bits, watermarking of analog video will require an MPEG Encode. Verimatrix DCT watermarking does not require MPEG encode.

Robust: watermark survives common video processing such as recompression (e.g. to 200kbps), A/D and D/A, cropping Invisible: DCT-based perceptual model, works in HD Anti-lift: watermarks can’t be lifted from one image to another

Anti-filtering:

digital filtering watermark cannot be removed by analog or

April 13, 2004

19

Test Results

Successful Watermark Distortion Survivability:  Distortions: 1. Interleave of 2 sources: 2 src files banded in avisynth (e and b) 2. Rotation: Rotated 1 degree in vdub 3. Cropping: cropped to remove traces of rotate 4. Scaling: resize to 512 in vdub 5. Compression: xvid encoding at 750kbps  Distortions: 1. Interleave of 5 files: 5 src files banded in avisynth 2. Low-pass filter: dctfilter in avisynth (1,1,1,.5,.5,0,0,0) 3. Scaling: resize to 512 in vdub 4. Compression: xvid encoding at 750kbps  More data to be made available soon…

April 13, 2004

20

Test Results (Cont.)

Other attacks that the watermark will survive:  Aspect ratio changes  Cut several top/bottom lines  Divx conversion with cropping  Filtering  Averaging watermarked copies

April 13, 2004

21

        

Development Schedules

Core product commercially viable now ARDG Analysis Matrix available Development for application to Analog Hole, first testable prototype scheduled July 2004. Testing with lab environment to begin early August Chip development work, and improvements (enhancements) currently scheduled to meet goal of end of Summer 2004 for complete cycle Closed Security Audit scheduled at end of cycle by third party auditing agency Marks to be licensed for all business models No royalties to be requested of CE and IT product implementers 25 Year Tariff lifetime Full mark maintenance plan

April 13, 2004

22

Conclusion

Proven and available technology

Invisible and robust mark

Known use royalties for all models

Low cost detection - no MPEG encode needed

HD capable

Total dedication to maintaining the effectiveness of the mark

April 13, 2004

23

Presentation Addendum

April 13, 2004

24

DVD Authoring adding CCI information

Input Video Standard MPEG Encode Processing CCI Watermark Added to Video MPEG Video Output with Embedded CCI  CCI Watermark information is added to video after standard MPEG Encoding Process.  The CCI Watermark can be added to any video before golden master is ready for DVD production, or master video is ready for distribution

April 13, 2004

25

False Detection Error Rate

 System False Detection Rate can be predetermined using error detection and correction codes (CRCs, BCH, Turbocodes)  Detector can integrate watermark over several frames to build strength of watermark  False detection error rates of 10 -5 to 10 -9 can be achieved

April 13, 2004

26